PanicStation.org
us Sexual violence & highly sensitive situations phone monitoring • device admin appeared • new admin settings • spyware on phone • stalkerware concern • intimate data exposed • partner tracking phone • ex monitoring device • hidden monitoring app • suspicious phone settings • phone privacy fear • digital abuse signs • abusive partner surveillance • someone reading messages • location tracking concern • unsafe shared phone • phone suddenly restricted • unknown administrator app • intimate photos risk • monitored smartphone

What to do if…
you notice your phone has new “device admin” or monitoring settings and you fear intimate data is exposed

Short answer

Do not rush to “clean” the phone. If this could be abuse, use a safer device to contact support and make your next moves there, because changes on the phone can sometimes alert the person monitoring it.

Do not do these things

  • Do not confront the person you suspect through that phone.
  • Do not immediately delete apps, revoke admin access, or factory-reset the device if you may want support or a record of the abuse later.
  • Do not rely on incognito mode, deleted history, or hidden folders to keep your activity private.
  • Do not use the suspected phone for safety planning, legal questions, or private messages about leaving.
  • Do not enter new passwords, backup codes, or intimate disclosures on the device you do not trust.
  • Do not assume this is “just tech stuff” if it feels frightening or controlling.

What to do now

  1. Shift sensitive activity to a safer device right away if you can. That might be a trusted friend’s phone, a work device, or a public computer you can use privately. Use that safer device for support, account changes, and anything involving intimate images or personal safety.

  2. Contact a domestic violence advocate from the safer device. The National Domestic Violence Hotline can help you think through tech abuse, phone monitoring, stalking concerns, and safer options without pressuring you to report. If you are in immediate danger, call 911.

  3. Make a basic note of what you noticed. Write down the date, time, exact wording of any alert, the name of any unfamiliar app, and what changed. Keep it simple. You do not need to perform a deep investigation.

  4. Assume the phone may show the other person what you do next. For now, avoid using it for new passwords, new secret accounts, conversations about leaving, or searching for help with abuse, stalking, or intimate-image issues.

  5. From a safer device, secure the accounts that unlock everything else. Start with your main email, then cloud photo storage, messaging apps, your wireless account, banking, and any account containing intimate images, backups, or shared albums. Change passwords, review logged-in devices, and remove devices you do not recognize.

  6. Review active sharing and linked access. Check location sharing, family-sharing features, shared photo libraries or albums, cloud backups, smartwatch or tablet links, and recovery phone numbers or email addresses. Turn off what you can safely change without increasing risk right now.

  7. If you use an iPhone, review Apple Safety Check if your phone supports it. It can help you review or stop sharing information and check who has account or device access. Use it when you are in a safer pause, not while someone may be watching you.

  8. If you use Android, look for unfamiliar high-access apps only if it feels safe. Search Settings for terms such as “device admin,” “admin apps,” permissions, or special access, and note unknown apps. The wording and menu names can vary by phone and Android version. You do not have to remove them immediately for your concern to be real.

  9. Think about your phone plan too. If the other person is on or controls the wireless account, they may have more visibility or control than just what is on the handset. From a safer device, check whether you need help separating from a shared wireless plan.

  10. If intimate images may be involved, keep your next step support-focused. You do not need to decide right now whether to report, send takedown requests, replace the phone, or tell anyone else. An advocate can help you sort immediate safety from later choices.

  11. If you may want to report later, avoid changing the phone more than necessary until you have spoken to an advocate, lawyer, law enforcement, or another support person you believe is safe and not linked to the suspected abuser. A short factual record is enough for now.

What can wait

You do not need to decide today whether to report to police, leave the relationship, replace the phone, move carriers, or check every app and account. You also do not need to solve the technical side all at once.

Important reassurance

Technology-facilitated monitoring is a known abuse tactic. It is common to second-guess yourself, feel suddenly exposed, or worry that no one will take it seriously. You are allowed to prioritize safety and support over proving exactly how it happened.

Scope note

This is first steps only. Later decisions about reporting, device examination, image takedowns, carrier separation, protective orders, or long-term digital security may need specialist help.

Important note

This is general information, not personal legal, technical, or clinical advice. In the USA, phone monitoring by a partner or ex can be part of stalking, harassment, or other abuse. The safest first move is usually to use a safer device, speak with an advocate, and avoid tipping off the person who may be monitoring you.

Additional Resources
Support us